wpa vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the wpa package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Incorrect Default Permissions

*
  • H
Insufficient Entropy

<2.3-1+deb8u10
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Origin Validation Error

<2.3-1+deb8u9
  • M
NULL Pointer Dereference

<2.3-1+deb8u8
  • H
Improper Authentication

*
  • M
Information Exposure

*
  • L
Use of a Broken or Risky Cryptographic Algorithm

<2.3-1+deb8u8
  • H
Improper Authentication

<2.3-1+deb8u8
  • H
Improper Authentication

<2.3-1+deb8u8
  • H
Improper Authentication

<2.3-1+deb8u8
  • H
Insufficient Entropy in PRNG

<2.3-1+deb8u7
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<2.3-1+deb8u6
  • M
Out-of-Bounds

<2.3-1+deb8u3
  • M
NULL Pointer Dereference

<2.3-1+deb8u3
  • M
Out-of-Bounds

<2.3-1+deb8u3
  • M
Use of Insufficiently Random Values

<2.3-1+deb8u5
  • M
Use of Insufficiently Random Values

<2.3-1+deb8u5
  • M
Use of Insufficiently Random Values

<2.3-1+deb8u5
  • M
Use of Insufficiently Random Values

<2.3-1+deb8u5
  • M
Use of Insufficiently Random Values

<2.3-1+deb8u5
  • M
Use of Insufficiently Random Values

<2.3-1+deb8u5
  • M
Use of Insufficiently Random Values

<2.3-1+deb8u5
  • M
Use of Insufficiently Random Values

*
  • H
Use of Insufficiently Random Values

<2.3-1+deb8u5
  • M
Use of Insufficiently Random Values

<2.3-1+deb8u5
  • H
Improper Data Handling

<2.3-1+deb8u4
  • H
Improper Input Validation

<2.3-1+deb8u4
  • M
Information Exposure

<2.3-1+deb8u3
  • M
Numeric Errors

<2.3-1+deb8u3
  • M
Out-of-Bounds

<2.3-1+deb8u3
  • M
Out-of-Bounds

<2.3-1+deb8u3
  • M
Resource Management Errors

<2.3-1+deb8u3
  • M
Out-of-Bounds

<2.3-1+deb8u3
  • M
Out-of-Bounds

<2.3-1+deb8u3
  • M
CVE-2015-4146

<2.3-1+deb8u3
  • M
Out-of-Bounds

<2.3-1+deb8u1
  • M
Improper Input Validation

<2.3-1
  • M
Out-of-Bounds

<1.0-3